Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1353343.1353349acmotherconferencesArticle/Chapter ViewAbstractPublication PagesedbtConference Proceedingsconference-collections
research-article
Free access

P2P systems with transactional semantics

Published: 25 March 2008 Publication History

Abstract

Structured P2P systems have been developed for constructing applications at internet scale in cooperative environments and exhibit a number of desirable features such as scalability and self-maintenance. We argue that such systems when augmented with well defined consistency semantics provide an attractive building block for many large scale data processing applications in cluster environments. Towards this end, we study the problem of providing transactional semantics to P-Ring a P2P system which supports efficient range queries. We first extend a commonly used replication protocol in P2P systems to provide well defined guarantees in the presence of concurrent updates and under well defined failure assumptions. A multi-version concurrency control protocol called LSTP which leverages the guarantees of the replication protocol to provide transactional semantics is proposed. LSTP is designed to provide useful consistency semantics over P-Ring for read intensive workloads without sacrificing the scalability and other desirable properties inherent to the system. Under LSTP, read-only transactions are abort-free and non-blocking and the index stores no state for such transactions. We show that LSTP ensures no missed dependencies between transactions and guarantees basic consistency for read-only transactions when update transactions are serializable. The design of LSTP and its provable properties is a proof of concept that P2P systems can be augmented with transactional semantics. Results from a preliminary simulation study are also presented.

References

[1]
A. Adya. Weak Isolation: A generalized theory and optimistic implementations for distributed transactions. PhD thesis, Massachusetts Institute of Technology, March 1999.
[2]
Amazon simple storage service. http://www.amazon.com/gp/browse.html?node=16427261.
[3]
L. Barraso, J. Dean, and U. Hölzle. Web search for a planet: The google cluster architecture. IEEE Micro, 23:22--28, 2003.
[4]
M. Bawa, A. Gionis, H. Garcia-Molina, and R. Motwani. The price of validity in dynamic networks. In SIGMOD, 2004.
[5]
H. Berenson, H. Bernstein, J. Gray, J. Melton, E. O. Neil, and P. O. Neil. A critique of the ansi sql isolation levels. In SIGMOD, 1994.
[6]
P. A. Bernstein, V. Hadzilacos, and N. Goodman. Concurrency control and recovery in database systems. Addision-Wessley Publishing Company, 1987.
[7]
A. Bosworth. Database issues for the 21st century. In SIGMOD, 2005.
[8]
A. Chan and R. Gray. Implementing distributed read-only transactions. IEEE transactions on Software Engineering, 11:205--212, 1985.
[9]
A. Crainiceanu, P. Linga, J. Gehrke, and J. Shanmugasundaram. P-ring: An efficient and robust p2p range index structure. In SIGMOD, 2007.
[10]
F. Dabek. Cooperative File System. PhD thesis, Massachusetts Institute of Technology, September 2001.
[11]
A. Fekete, D. Liarokopis, E. O'Neil, P. O'Neil, and D. Shasha. Making snapshot isolation serializable. ACM transactions on Database Systems, 30:492--528, 2005.
[12]
B. Gedik and L. Liu. Peercq: A decentralized and self-configuring peer-to-peer information monitoring system. In ICDCS, 2003.
[13]
Google alerts. http://www.google.com/alerts.
[14]
A. Gupta, O. Sahin, D. Agrawal, and A. E. Abbadi. Meghdoot: Content-based publish/subscribe over p2p networks. In Middleware, 2004.
[15]
R. Huebsch, B. Chun, J. Hellerstein, B. Loo, P. Maniatis, T. Roscoe, S. Shenker, I. Stoica, and A. Yumerefendi. The architecture of pier: an internet-scale query processor. In CIDR, 2005.
[16]
J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao. OceanStore: An architecture for global-scale persistent storage. In ASPLOS, 2000.
[17]
P. Linga, A. Crainiceanu, J. Gehrke, and J. Shanmugasundaram. Guaranteeing correctness and availability in p2p range indices. In SIGMOD, 2005.
[18]
G. Lomet. Replicated indexes for distributed data. In PDIS, 1996.
[19]
N. Lynch, D. Malkhi, and D. Ratajczak. Atomic data access in distributed hash tables. In IPTPS, 2002.
[20]
D. Narayanan, A. Donnelly, R. Mortier, and A. Rowstron. Delay aware querying with seaweed. In VLDB, 2006.
[21]
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker. A scalable content-addressable network. In SIGCOMM, 2001.
[22]
S. Rhea, D. Geels, T. Roscoe, and J. Kubiatowicz. Handling churn in a dht. In USENIX, 2004.
[23]
J. Shanmugasundaram, A. Nithrakashyap, R. Sivasankaran, and K. Ramamritham. Efficient concurrency control for broadcast environments. In SIGMOD, 1999.
[24]
M. Srivatsa and L. Liu. Vulnerabilities and security threats in structured overlay networks: A quantitative analysis. In ACSAC, 2004.
[25]
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM, 2001.
[26]
C. Türker, K. Haller, C. Schuler, and H. Schek. How can we support grid transactions? towards peer-to-peer transaction processing. In CIDR, 2005.
[27]
W. E. Weihl. Distributed version management for read-only actions. IEEE transactions on Software Engineering, SE-13:55--64, 1987.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
EDBT '08: Proceedings of the 11th international conference on Extending database technology: Advances in database technology
March 2008
762 pages
ISBN:9781595939265
DOI:10.1145/1353343
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 March 2008

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

EDBT '08

Acceptance Rates

Overall Acceptance Rate 7 of 10 submissions, 70%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)28
  • Downloads (Last 6 weeks)8
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2011)A survey of DHT security techniquesACM Computing Surveys10.1145/1883612.188361543:2(1-49)Online publication date: 4-Feb-2011
  • (2010)Towards elastic transactional cloud storage with range query supportProceedings of the VLDB Endowment10.14778/1920841.19209073:1-2(506-514)Online publication date: 1-Sep-2010
  • (2009)Locating XML Documents in a Peer-to-Peer Network Using Distributed Hash TablesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2009.2621:12(1737-1752)Online publication date: 1-Dec-2009
  • (2009)Re:GRIDiT — Coordinating distributed update transactions on replicated data in the Grid2009 10th IEEE/ACM International Conference on Grid Computing10.1109/GRID.2009.5353081(120-129)Online publication date: Oct-2009

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media